Trojan side-channels: Lightweight hardware trojans through side-channel engineering L Lin, M Kasper, T Güneysu, C Paar, W Burleson Cryptographic Hardware and Embedded Systems-CHES 2009: 11th International …, 2009 | 276 | 2009 |
MOLES: Malicious off-chip leakage enabled by side-channels L Lin, W Burleson, C Paar Proceedings of the 2009 international conference on computer-aided design …, 2009 | 202 | 2009 |
Low-power sub-threshold design of secure physical unclonable functions L Lin, D Holcomb, DK Krishnappa, P Shabadi, W Burleson Proceedings of the 16th ACM/IEEE international symposium on Low power …, 2010 | 109 | 2010 |
Design and validation of arbiter-based PUFs for sub-45-nm low-power security applications L Lin, S Srivathsa, DK Krishnappa, P Shabadi, W Burleson IEEE Transactions on Information Forensics and Security 7 (4), 1394-1403, 2012 | 74 | 2012 |
Leakage-based differential power analysis (LDPA) on sub-90nm CMOS cryptosystems L Lin, W Burleson 2008 IEEE International Symposium on Circuits and Systems (ISCAS), 252-255, 2008 | 59 | 2008 |
Analysis and mitigation of process variation impacts on power-attack tolerance L Lin, W Burleson Proceedings of the 46th annual design automation conference, 238-243, 2009 | 41 | 2009 |
Source cell-phone identification in the presence of additive noise from CQT domain T Qin, R Wang, D Yan, L Lin Information 9 (8), 205, 2018 | 30 | 2018 |
A fast side-channel leakage simulation technique based on IC chip power modeling A Tsukioka, K Srinivasan, S Wan, L Lin, YS Li, N Chang, M Nagata IEEE Letters on Electromagnetic Compatibility Practice and Applications 1 (4 …, 2019 | 28 | 2019 |
Implementing hardware trojans: Experiences from a hardware trojan challenge GT Becker, A Lakshminarasimhan, L Lin, S Srivathsa, VB Suresh, ... 2011 IEEE 29th International Conference on Computer Design (ICCD), 301-304, 2011 | 26 | 2011 |
Multiphysics simulation of em side-channels from silicon backside with ml-based auto-poi identification L Lin, D Zhu, J Wen, H Chen, Y Lu, N Chang, C Chow, H Shrivastav, ... 2021 IEEE International Symposium on Hardware Oriented Security and Trust …, 2021 | 16 | 2021 |
Security properties driven pre-silicon laser fault injection assessment N Pundir, H Li, L Lin, N Chang, F Farahmandi, M Tehranipoor 2022 IEEE International Symposium on Hardware Oriented Security and Trust …, 2022 | 12 | 2022 |
Fast and comprehensive simulation methodology for layout-based power-noise side-channel leakage analysis L Lin, D Selvakumaran, D Zhu, N Chang, C Chow, M Nagata, K Monta 2020 IEEE International Symposium on Smart Electronic Systems (iSES …, 2020 | 11 | 2020 |
Detection of replay attack based on normalized constant q cepstral feature Y Ye, L Lao, D Yan, L Lin 2019 IEEE 4th International Conference on Cloud Computing and Big Data …, 2019 | 9 | 2019 |
A replay speech detection algorithm based on sub-band analysis L Lin, R Wang, Y Diqun Intelligent Information Processing IX: 10th IFIP TC 12 International …, 2018 | 8 | 2018 |
Design optimization and security validation of sub-threshold PUFs L Lin, D Holcomb, DK Krishnappa, P Shabadi, W Burleson Proceedings of the Secure Component and System Identification Workshop …, 2010 | 8 | 2010 |
A robust method for speech replay attack detection L Lin, R Wang, D Yan, L Dong KSII Transactions on Internet and Information Systems (TIIS) 14 (1), 168-182, 2020 | 7 | 2020 |
Silicon-correlated simulation methodology of em side-channel leakage analysis K Monta, L Lin, J Wen, H Shrivastav, C Chow, H Chen, J Geada, ... ACM Journal on Emerging Technologies in Computing Systems 19 (1), 1-23, 2022 | 6 | 2022 |
SPILL—Security Properties and Machine-Learning Assisted Pre-Silicon Laser Fault Injection Assessment N Pundir, H Li, L Lin, N Chang, F Farahmandi, M Tehranipoor International Symposium for Testing and Failure Analysis 84437, 225-236, 2022 | 5 | 2022 |
Ml-augmented methodology for fast thermal side-channel emission analysis N Chang, D Zhu, L Lin, D Selvakumaran, J Wen, S Pan, W Xia, H Chen, ... Proceedings of the 26th Asia and South Pacific Design Automation Conference …, 2021 | 5 | 2021 |
Layout-level vulnerability ranking from electromagnetic fault injection L Lin, J Wen, H Shrivastav, W Li, H Chen, G Ni, S Chowdhury, C Chow, ... 2022 IEEE International Symposium on Hardware Oriented Security and Trust …, 2022 | 4 | 2022 |